CVE-2006-1055
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/04/2006
Last modified:
03/04/2025
Description
The fill_write_buffer function in sysfs/file.c in Linux kernel 2.6.12 up to versions before 2.6.17-rc1 does not zero terminate a buffer when a length of PAGE_SIZE or more is requested, which might allow local users to cause a denial of service (crash) by causing an out-of-bounds read.
Impact
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19495
- http://secunia.com/advisories/19735
- http://secunia.com/advisories/19955
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20716
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D6e0dd741a89be35defa05bd79f4211c5a2762825
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommitdiff%3Bh%3D6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp%3D597a7679dd83691be2f3a53e1f3f915b4a7f6eba
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24443
- http://www.securityfocus.com/bid/17402
- http://www.trustix.org/errata/2006/0020
- http://www.ubuntu.com/usn/usn-302-1
- http://www.vupen.com/english/advisories/2006/1273
- http://www.vupen.com/english/advisories/2006/1475
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25693
- https://usn.ubuntu.com/281-1/
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19495
- http://secunia.com/advisories/19735
- http://secunia.com/advisories/19955
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20716
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D6e0dd741a89be35defa05bd79f4211c5a2762825
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommitdiff%3Bh%3D6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp%3D597a7679dd83691be2f3a53e1f3f915b4a7f6eba
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24443
- http://www.securityfocus.com/bid/17402
- http://www.trustix.org/errata/2006/0020
- http://www.ubuntu.com/usn/usn-302-1
- http://www.vupen.com/english/advisories/2006/1273
- http://www.vupen.com/english/advisories/2006/1475
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25693
- https://usn.ubuntu.com/281-1/



